Ad Image

Swiss Army Knife: SD-WAN Combined with 5G, SASE, IoT, and More

SD-WAN

SD-WAN

Solutions Review’s Expert Insights Series is a collection of contributed articles written by industry experts in enterprise software categories. Bruce Johnson of Cradlepoint examines the versatility of SD-WAN, and the different ways it can combine with other network security tech.

Expert Insights badgeWireless networking is almost ubiquitous in the enterprise today. In a recent study, 86 percent of IT executive respondents said they now use wireless wide-area networks (WAN) as their primary connectivity option for at least a portion of their sites. This means many IT leaders are realizing the cost and connectivity benefits of a wireless approach.

Wired networking is far from dead, but as dependency on Wireless WAN grows, IT leaders must be prepared to adjust to the types of traffic — and the sheer volume of it — traveling through their networks. To safely and securely make this adjustment, IT leaders must invest in a combination of the latest software-defined wide area network (SD-WAN) and security technologies to ensure their wireless WANs can grow efficiently at scale.

[box style=”3″]

In the market for network monitoring solutions? Check out our free Solutions Buyer’s Guide!

[/box]

SD-WAN and 5G

Many enterprises already acknowledge how SD-WAN can amplify speed and efficiency at the network edge. According to the EMA report, 71 percent of IT executive respondents said they use SD-WAN vendors to accelerate WAN. As enterprises moved away from relying entirely on wired connections, SD-WAN’s ability to recognize and prioritize different transport types made it the best technology to transfer data for broadband and wireless WAN securely.

As more enterprises depend on 4G and 5G technologies, thereby introducing more transport types into their networks, SD-WAN will continue to be the best option to establish connectivity securely. This will be especially important with 5G standalone networks on the horizon, which will, in turn, enable network slicing. If enterprises want to ensure data securely goes to the correct network slices, they’ll need the transport intelligence SD-WAN provides.

There are already real-life use cases, including in the public safety arena, where the secure data transport features SD-WAN technologies offer are in effect. In some cases, those are even driven by public policy mandates. For example, multiple states have passed laws instructing police departments to prioritize sensitive data transfers. These police departments must now provide priority traffic steering to confidential information. The best way to securely transfer this data from police departments leveraging wireless WAN — or police vehicles that have no choice but to operate on a wireless network — is through the secure traffic-steering capabilities of SD-WAN technologies.

Combining SD-WAN with Other SASE Principles

Protecting devices while they’re on the enterprise SD-WAN is one thing. But as we all know, life is not so simple, and it’s all but guaranteed that your organization’s devices will also be connecting to networks you don’t control. So it’s important to remember that devices that “go out into the wild” will need additional security to protect both their network and the devices themselves.

Gartner’s secure access service edge (SASE) principles provide robust guidance for security features that can protect devices no matter where they are. Suppose service providers offer a cloud-based security solution that includes the characteristics associated with SASE (zero-trust network access, secure web gateways, cloud security brokering, and remote browser isolation). In that case, they can create security policies that follow their devices even when they leave SD-WAN security and go to unprotected networks.

Examining the previous police department example, there could be moments when a police officer takes their laptop from their vehicle — where an SD-WAN router securely transfers data — and moves into a courtroom to testify. With that move, they are now connected to the courtroom’s Wi-Fi network or may even connect to a cellular network if the device is enabled to do so.

If the department leverages a cloud-based SASE solution, they can ensure the security policies that protect the laptop inside their wireless WAN network also travel with the device when it moves to other networks. This means if the laptop accesses the internet inside the courtroom, it can still get protection from malicious inbound traffic with ZTNA and also remain secure with remote browser isolation if the officer needs to access the web.

These security measures should resonate with IT leaders of all industries as their networks grow and their digital dependencies grow. In the world of hybrid work, there will be a growing number of mobile devices, from laptops to smartphones, and IT leaders will need to protect their networks and devices as those devices travel from network to network.

Today’s IT Leaders Need to Protect Their Data

Now more than ever, IT executives are keen to protect company data, especially as it travels from device to device. In today’s world of uncertainty and rampant cybersecurity risk, that data holds unprecedented value for how executives will make decisions best for their business and employees. With networks proliferating and digital devices — both user-based devices and non-user-based Internet of Things (IoT) devices — becoming more necessary, there are many avenues through which bad actors can access that data. However, if IT executives combine the secure transfer capabilities of SD-WAN with the premium security benefits of SASE, they can create a comprehensive security solution that protects their assets and network.

Download Link to Data Integration Buyers Guide

Bruce Johnson
Follow Bruce
Latest posts by Bruce Johnson (see all)

Share This

Related Posts